Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Growing MSSPs Benefit from Tools with Public-Cloud Pricing

This blog was originally published on MSSP Alert on October 16, 2024. MSSPs want to grow—but the complexity of modern security operations (SecOps) and the unique demands of the security services market make this challenging. In this post, we’ll look at how tools with public cloud or public cloud-like pricing—pricing that is usage- or consumption-based rather than fixed fee or license-based—can help MSSPs grow more effectively and efficiently.

CRQ Model Update Increases Statistical Significance With 25,000 Trials

As a part of its ongoing commitment to providing chief information security officers (CISOs) with practicable insights that guide high-level cyber risk management decision-making, Kovrr's latest model update increases the number of yearly trials in its Monte Carlo simulation by 150%.

Revamping Egnyte's Sharing & Permissions: A User-Centric Journey

Great product design not only boosts engagement but also improves user efficiency and productivity. At Egnyte, we understand this deeply and focus on bridging the gap between business requirements and agile feature development, ensuring a seamless user experience. The faster users grasp product features, the sooner they see a return on investment. To achieve this, we aim for intuitive and simple product design.

From Hidden to Exposed: Advanced Graylog Alerts for Malicious Activity

Think you've implemented every security measure possible? Think again. While you may have addressed many common attack vectors from both threat actors and Red Team engagements, there's always more to uncover. This session is designed to push your defenses to the next level by diving deep into the often-overlooked tactics that can significantly enhance your security posture.

Access AWS RDS Databases in EKS Using Teleport Machine ID Without Passwords

At Teleport we love modern infrastructure and open-source software, but don't like static credentials and passwords. This created a challenge for us when deploying Temporal, an open-source workflow automation software on EKS: Temporal always requires a password to authenticate to the backend RDS database. To solve this problem, we turned to Teleport Machine & Workload Identity.

Understanding Cryptographic Mechanisms

Cryptographic mechanisms protect the integrity of audit tools by ensuring that the data they collect is trustworthy. Most systems constantly run audit tools in the background, system activity such as user logins, file changes and network activity is monitored and recorded. These records are vital to system administrators for compliance, forensic analysis and security monitoring. Using cryptographic mechanisms is vital to the integrity of this data.

How to Conduct a Risk Assessment for Your Disaster Recovery Playbook

Risk management is at the heart of any effective disaster recovery (DR) plan or playbook. No business is immune to disruptions, whether from natural disasters, cyberattacks, or technical failures. The question isn’t if, but when these threats will materialize. A proactive approach to risk management allows businesses to identify, assess, and mitigate these threats before they can bring operations to a standstill.